X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 computer authentication history


Security Stocks Burn Rubber
Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and

computer authentication history  Cyberguard was formerly the computer systems division of Harris Corporation, and was spun-off and incorporated in 1994. Under the leadership of David Proctor, the former COO of Platinum Software Corporation, Cyberguard has become a maverick firewall vendor with educational institutions. It provided Syracuse University the detailed presentations and documentation on configuring and administering network security, which were used to develop the syllabus and curriculum for a course, titled Building

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Help Desk for the Health Care Industry

Help Desk is an application for assisting and managing calls for support from computer users. It also includes computer and software inventory tracking along with technical support knowledge bases.  

Evaluate Now

Documents related to » computer authentication history

E-mail 101


The first e-mail programs were created in the late 60s/early 70s—simpler times, when everyone on the network was trustworthy. Even knowing what we know today about spammers, we still tend to take e-mail for granted, and trust it far more than it deserves. Learn about the components of the e-mail system, understand how e-mail moves on the Internet, and find out how to interpret e-mail message headers.

computer authentication history   Read More

A Well-designed Solution for Sourcing: Its Technological Foundation and How It Works


TradeStone has developed an application that can be quickly configured to shift data in and out of traditional enterprise planning systems. Organizations can thus more easily intertwine basic procurement information with crucial sourcing data such as specifications, schedules, and statuses.

computer authentication history   Read More

The Future of Secure Remote Password (SRP)


The Secure Remote Password (SRP) holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other password-based authentication schemes. Yet the industry de-facto standard remains the password-based authentication scheme. This article explores the possibilities for SRP in today’s multi-channel world, specifically how it improves upon the inherent insecurity of password authentication and the obstacles to overcome to succeed.

computer authentication history   Read More

Information Security Firewalls Market Report Part One: Market Overview and Technology Background


The firewall market is a mature and competitive segment of the information security market. With numerous vendors and firewalls in all price ranges choose from, IT decision makers should be especially selective. This report presents a market overview and some criteria for selecting products from the long list of contenders.

computer authentication history   Read More

Software and Computer Services




computer authentication history   Read More

Best Practices in Authentication and Access Control: Comparing 802.1x to the Nevis LAN Security Approach


The 802.1x protocol should be the obvious choice when implementing user-based authentication in enterprise networks. So why doesn’t everyone use it? Because it doesn’t give a complete solution for authentication and policy requirements, even when it’s integrated with a network access control (NAC) solution. But if you integrate 802.1x with a local area network (LAN) secure switch, you get a more complete secure solution.

computer authentication history   Read More

Computer Guidance Corp’s Construction ERP Longevity


I have only recently been made aware of Computer Guidance Corporation (CGC) and its leading construction ERP solution for architecture, engineering, and commercial construction companies, even though the company has been around for over 30 years. CGC’s eCMS Construction ERP solution had then and still has among the best construction accounting, payroll, and job cost functionality around.

computer authentication history   Read More

Identix Leads Biometric Authentication


Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.

computer authentication history   Read More

Dell Uses its Muscle to Beat Side-Effects of Taiwan Quake


Dell Computer Corp. chairman Michael Dell said Thursday the company's financial performance should not be affected by September's earthquake in Taiwan.

computer authentication history   Read More

PTC Windchill Version 9 versus Version 10: Is Version 10 the Most Significant Windchill Release in PTC’s History?


The latest iteration of PTC Windchill (v. 10) for product lifecycle management (PLM) has been described as ‘the most significant Windchill release in PTC’s history.’ In his article, TEC research analyst Gabriel Gheorghiu compares the last two versions of PTC Windchill, and outlines how the functionality enhancements in PTC Windchill 10 make the product suitable for product creation, development, and lifecycle management.

computer authentication history   Read More